(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Related People

Abstract

A methodology is described which defines a mechanism for monitoring other users' attempts to gain access to one's calendar facility, whereby a user is notified through a multimedia interface object of all pertinent information related to the inquiry.

Country

United States

Language

English (United States)

This text was extracted from an ASCII text file.

This is the abbreviated version, containing approximately
36% of the total text.

A methodology
is described which defines a mechanism for
monitoring other users' attempts to gain access to one's calendar
facility, whereby a user is notified through a multimedia interface
object of all pertinent information related to the inquiry.

Maintaining
security is an integral part of any business.
Security needs require confidential meetings, announcements, and
proprietary information be safe from unauthorized people. It is
often desirable to be alerted when another person has accessed one's
calendar, and is examining either past or future calendar screens or
the current calendar information.
Furthermore, it is desirable to
know not only who was interested in your calendar, but also what
information they were inquiring about, particularly when a system is
incapable of preventing calendar access by other users.

Consequently,
individuals may track a user's calendar in an
attempt to gain knowledge about IBM* products, meetings, or
announcements. An individual could gain
access to an authorized user
ID and probe various calendars for facts and information that can be
assimilated from another's calendar facility.

Currently,
calendar facilities can be configured to give other
individuals read only or read and write access to a user's calendar.
Some calendars can be configured to automatically notify the owner of
any type of inquiry made against any entry on the owner's calendar.

A method for
automatically notifying a user of any type of
inquiry made against any entry on his/her calendar has been used.
Capability was also provided to allow calendar entry security
information to be exchanged between systems either locally or
remotely. However, they did not address
the following issues that
the present methodology does.

o Configuring a different announcement (to the
calendar
owner)
o based on attributes of the interrogating
user.
o The actual calendar information being
interrogated.
o History log of all accesses.

While the
owner of the calendar may be notified that an inquiry
is being made against his calendar, no technology exists for
representing the actual inquiry (textually or graphically) to the
owner of the calendar.

The proposed
methodology is an object oriented graphical user
interface for security objects. To
provide true calendar security
one must have visual representation on the screen of these inquiries
so that they can be selected and actions can be taken on them, such
as opening them to examine their IDs, status, access rights, inquiry
history file, inquiry duration, etc.

The preferred
embodiment allows the owner to manipulate the
interface object through a graphical user interface rather than
through a prompted command line user interface.
Furthe...